UTTARAKHAND OPEN UNIVERSITY Teen Pani Bypass Road, Near Transport Nagar, Haldwani -263139 Phone No- 05946 - 261122, 261123 Toll Free No

Total Page:16

File Type:pdf, Size:1020Kb

UTTARAKHAND OPEN UNIVERSITY Teen Pani Bypass Road, Near Transport Nagar, Haldwani -263139 Phone No- 05946 - 261122, 261123 Toll Free No CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [1] CYL- 104 Cyber Crimes And Consumer Protection in Cyber Space School of Law UTTARAKHAND OPEN UNIVERSITY Teen Pani Bypass Road, Near Transport Nagar, Haldwani -263139 Phone No- 05946 - 261122, 261123 Toll Free No. 18001804025 Fax No.- 05946-264232, Email- [email protected], http://uou.ac.in Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [2] BOARD OF STUDIES Professor Girija Prasad Pande, Director, School of Law, Uttarakhand Open University, Haldwani, Nainital. Professor J.S.Bisht, Faculty of Law,S.S. Jeena Campus, Almora,Kumaun University, Nainital, Uttarakhand. Professor B.P. Maithani, Former RTI Advisor, Government of Uttarakhand Mr. Deepankur Joshi, Coordinator School of Law, Uttarakhand Open University, Haldwani, (Nainital). UNIT WRITING UNIT WRITERS UNIT [1] Dr. Razit Sharma, Assistant Professor, Unit- 1,2,3,4 Law College, Uttaranchal University, Dehradun Uttarakhand [2] Ms. Sapna Agarwal, Advocate High Court of Uttarakhand, Unit- 5,6,7 Nainital [3 Mr. Rajeev Bhatt, Advocate High Court of Uttarakhand, Ex. RTI Advisor Kumaun University Nainital, Ex. Assistant Professor Unity Unit- 8 ,9,10 Law College Rudrapur [4] Dr. Sushim Shukla, Assistant Professor, Unit- 11, 12, 13 Law College, Uttaranchal University, Dehradun Uttarakhand EDITOR Mr. Deepankur Joshi, Coordinator, School of Law, Uttarakhand Open University, Haldwani, (Nainital) Copyright © Uttarakhand Open University, Haldwani, Nainital Edition- 2018, Pre Publication copy for Limited Circulation ISBN- Publication- Directorate of Studies and Publication, Uttarakhand Open University, Haldwani, Nainital. E- Mail: [email protected] . Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [3] POST GRADUATE DIPLOMA IN CYBER LAW CYL- 104 CYBERCRIMES AND CONSUMER PROTECTION IN CYBER SPACE INDEX S. NO. UNIT PAGE NO. 1 DEFINING CRIME 4 - 13 2 CRIME IN CONTEXT OF INTERNET-ACTUS REA/MENSREA 14 - 21 3 TYPES OF CRIME IN INTERNET 22 - 31 4 COMPUTING DAMAGE IN INTERNET CRIME 32 - 41 5 FRAUD,HACKING,MISCHIEF 42 - 60 6 TRESPASS,DEFAMATION,STALKING,SPAM 61 - 91 7 PENALTIES AND OFFENCES UNDER IT ACT 92 - 146 8 ISSUES OF INTERNET GOVERNANCE 147 - 153 9 FREEDOM OF EXPRESSION IN INTERNET 154 - 160 10 INTERNATIONAL POSITIONS ON FREE SPEECH IN INTERNET 161 - 168 11 THE SALES OF GOODS ACT 1930 169 - 175 12 THE SPECIFIC RELIEF ACT,1963 176 - 194 13 THE CONSUMER PROTECTION ACT,1986 195 - 205 Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [4] UNIT-1 DEFINING CRIME 1.1.INTRODUCTION 1.2.OBJECTIVES 1.3.STRUCTURE 1.3.1. DEFINING CRIME 1.3.2. CYBERSPACE 1.3.3. INTERNET 1.3.4. COMMUNICATION THROUGH INTERNET 1.3.5. CONCEPT OF CYBERCRIME 1.3.6. CYBERCRIMINALS 1.3.7. ORIGIN/DEVELOPMENT OF CYBERCRIME 1.3.8. NATURE AND SCOPE OF CYBER CRIME 1.3.9. CAUSES FOR INTERNET CRIMES 1.3.10. DIFFERENCE BETWEEN CYBERCRIME AND TRADITIONAL CRIME 1.3.11. CLASSIFICATION OF CYBER CRIME 1.3.11.1 CRIME AGAINST INDIVIDUALS 1.3.11.2. CRIME AGAINST ORGANISATION 1.3.11.3 CRIME AGAINST SOCIETY 1.3.12. FREQUENTLY USED CYBERCRIMES 1.3.13. DIFFERENT CHANNELS OF CYBERCRIME 1.3.14. IMPACT OF CYBER CRIME 1.3.15. PREVENTIVE MEASURES TO COMBAT CYBERCRIME 1.4.SUMMARY 1.5.SAQS 1.6.REFERENCES 1.7.SUGGESTED READINGS 1.8. TERMINAL QUESTIONS AND MODEL QUESTIONS 1.1. INTRODUCTION Crime is a social and economic phenomenon which goes against legal obligations and certain moral sentiments developed in the history of human society. In ancient days any conduct Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [5] offending the interest or threatening the security of mankind was a crime. Crime is a dynamic concept which changes with social transformation. As the societies grow and with new and advanced science and technological developments new forms of crimes began to emerge. Present world is experiencing the growing importance of internet in every sphere of life. Undoubtedly, the crimes in cyberspace are also growing fast. This unit in specific discusses the introductory part of crimes committed thorough internet. 1.2. OBJECTIVES The study of the chapter will make students understand o The concept of crime o The Origin and Development of Cyber crime o Classifications of Cybercrime o Impact of Cybercrime and its challenges 1.3. STRUCTURE 1.3.1. Defining Crime The word crime is derived from a Latin word ‘Crimean’ which means ‘charge’ or ‘cry of distresses. It typically refers to an intellectual mistake or an offense against a society or an individual. Crime is an act which is deemed to be socially harmful, unacceptable and is punishable by law. This approach to the concept of crime changes according to the social, political, psychological and economic structure of a society. Several factors like sociological factors, psychological factors, circumstantial elements etc, influences the criminal activity of an individual or a group. Crimes are again of different types like monetary crime, Sexual crimes, Political crime and miscellaneous crimes. With the advent of science and technology crime also has completely taken a new dimension. It has grown to that extent that it is measured in hours and minutes rather than months and years. 1.3.2. Cyberspace Cyberspace is a term used to describe the virtual world of computers. William Gibson coined the term ‘Cyber space’ in his book “Neuromancer” in the year 1984. In simple words it can be stated that Cyberspace is an intricate environment that involves interactions between people, software, and services. This is in fact controlled by the worldwide distribution of information and communication technology devices and networks. Due to the advancements in technology and increase in networks and devices connected, the cyberspace today serves as a common platform for users from different fields that it has become difficult to define a clear boundary among the different groups. People involved in cyberspace, use of computers, Information technology and internet are known as ‘Netizens’. It is a word coined from the association of two words ‘Internet’ and ‘Citizen’. Cyberspace can be considered to be global village in the electronic world with instantaneous communication and no geographical boundaries. 1.3.3. Internet Due to the significant development of computer technology, the present generation cannot imagine a life without computers. They have invaded every aspect of life and the impact is that it has created challenge even to the fundamental principles of law. The administration of Internet is not in the hands of any individual, Government, Corporation or firm. It includes a Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [6] network of hundreds and thousands of computers connected to use common data transfer protocol or exchange of information with other computers. This series of networks of computers is called as “Internet”, which has the quality of rapidly transmitting communication. Information available at any link means information is available to all connected with that link and there is no individual to control all the information that is available in the Internet. 1.3.4. Communication through Internet In order to understand the legal issues involved one should have a thorough knowledge of the means of communication available to transfer through Internet. In general, there are three means available for a user to access Internet. (i) Direct Access- In this mode a user can be directly linked to the Internet without an intermediary. Generally, Government offices, Educational Institutions, Business establishments maintain a computer network linked directly. (ii) Service Providers- Here certain commercial entities provide Internet facility to general public in lieu of the fee paid, thus making a commercial use of the Internet. (iii) Commercial online Service- Here the commercial entities provides direct access to their own content, to the users of their service without any fee. Exchange of communication through Internet is done by different modes. 1. One to one communication (e.g. E-mail) 2. One to many communication (e.g. List server) 3. Sharing of information databases. (e.g. USENET) 4. Real Time Communication (e.g. Internet Relay Chat) 5. Real time remote computer utilization (e.g. Telnet) 6. Remote Information retrieval (e.g. World Wide Web) As Technology is growing at a faster pace, there are certain issues like security of transactions, privacy, protection of children against easy access to inappropriate contents etc. that has to address urgently with a strict legal regime. 1.3.5. Concept of Cybercrime Cybercrime is the term used to refer electronic offenses, e-crimes, white collar crimes etc. In other words, any illegal activity carried out with the help of computer, Internet or electronic gadget is called as ‘Cyber-crime’. The phenomenal growth of Internet has provided new panorama to the increase of computer related crimes. Here computer or the data itself is the target of offence or a tool to commit any offence. The term ‘Cybercrime’ or ‘Computer crime’ are the terms generally used and includes a wide range of activity ranging from unauthorised access to computer or the data stored in it, trafficking in passwords, transmission of pornographic material, selling pirated copies of software etc. Hence currently the term ‘Computer-Related crime’ is widely used. However, in a specific context, ‘Computer Crime’ is where the criminal has an expertise in computer technology. In ‘Cybercrime’ the perpetrators use their specialised knowledge and skills on cyberspace. A computer crime is defined by the US Department of Justice as “An illegal act requiring knowledge of computer technology for its perpetration, investigation or prosecution”. But the Uttarakhand Open University CYBER CRIMES AND CONSUMER PROTECTION IN CYBERSPACE CYL-104 [7] definition is not exhaustive and it can also be plainly defined as “Crimes directed at a computer or a computer system”.
Recommended publications
  • Uttarakhand Van Panchayats
    Law Environment and Development JournalLEAD ADMINISTRATIVE AND POLICY BOTTLENECKS IN EFFECTIVE MANAGEMENT OF VAN PANCHAYATS IN UTTARAKHAND, INDIA B.S. Negi, D.S. Chauhan and N.P. Todaria COMMENT VOLUME 8/1 LEAD Journal (Law, Environment and Development Journal) is a peer-reviewed academic publication based in New Delhi and London and jointly managed by the School of Law, School of Oriental and African Studies (SOAS) - University of London and the International Environmental Law Research Centre (IELRC). LEAD is published at www.lead-journal.org ISSN 1746-5893 The Managing Editor, LEAD Journal, c/o International Environmental Law Research Centre (IELRC), International Environment House II, 1F, 7 Chemin de Balexert, 1219 Châtelaine-Geneva, Switzerland, Tel/fax: + 41 (0)22 79 72 623, [email protected] COMMENT ADMINISTRATIVE AND POLICY BOTTLENECKS IN EFFECTIVE MANAGEMENT OF VAN PANCHAYATS IN UTTARAKHAND, INDIA B.S. Negi, D.S. Chauhan and N.P. Todaria This document can be cited as B.S. Negi, D.S. Chauhan and N.P. Todaria, ‘Administrative and Policy Bottlenecks in Effective Management of Van Panchayats in Uttarakhand, India’, 8/1 Law, Environment and Development Journal (2012), p. 141, available at http://www.lead-journal.org/content/12141.pdf B.S. Negi, Deputy Commissioner, Ministry of Agriculture, Govt. of India, Krishi Bhawan, New Delhi, India D.S. Chauhan, Department of Forestry, P.O. -59, HNB Garhwal University, Srinagar (Garhwal) – 246 174, Uttarakhand, India N.P. Todaria, Department of Forestry, P.O. -59, HNB Garhwal University, Srinagar (Garhwal) – 246 174, Uttarakhand, India, Email: [email protected] Published under a Creative Commons Attribution-NonCommercial-NoDerivs 2.0 License TABLE OF CONTENTS 1.
    [Show full text]
  • A Comparative Study of Women in Local Government in India and Pakistan
    Journal of International Politics Volume 2, Issue 2, 2020, PP 24-32 ISSN 2642-8245 A Comparative Study of Women in Local Government in India and Pakistan Nadeem Malik* Development Studies Program, School of Social and Political Sciences, The University of Melbourne, Australia. *Corresponding Author: Nadeem Malik, Development Studies Program, School of Social and Political Sciences, The University of Melbourne, Australia ABSTRACT Women's participation and representation in politics at the local level is considered important for gender equity and women’s empowerment. The recent wave of decentralisation in the late 1990s in India and Pakistan promised to solve women-related community problems at the grass-root level and more importantly, to empower them socially, economically and politically. This article demonstrates the extent to which such aspirations could be realized. Keyword: women’s political representation, local government, India, Pakistan INTRODUCTION institutions and the donor countries. With few exceptions, this is most vividly illustrated by the The decade of the 1980s saw an increasing rise of political gangsters in the leadership of enthusiasm for decentralisation in developing parties, parliaments and executive bodies at the countries. The concept itself was part of the good local level in most countries1. The failure of governance agenda of the World Bank and decentralizing was due to inadequate local donor countries in the first world (Malik, 2016). It was thought that the failure of earlier government framework, ineffective implementation development paradigms (especially the structural or capture of local government by interest groups or adjustment program) was due to bad institutional a combination of these factors (Malik, 2009).
    [Show full text]
  • Tangled Web : Tales of Digital Crime from the Shadows of Cyberspace
    TANGLED WEB Tales of Digital Crime from the Shadows of Cyberspace RICHARD POWER A Division of Macmillan USA 201 West 103rd Street, Indianapolis, Indiana 46290 Tangled Web: Tales of Digital Crime Associate Publisher from the Shadows of Cyberspace Tracy Dunkelberger Copyright 2000 by Que Corporation Acquisitions Editor All rights reserved. No part of this book shall be reproduced, stored in a Kathryn Purdum retrieval system, or transmitted by any means, electronic, mechanical, pho- Development Editor tocopying, recording, or otherwise, without written permission from the Hugh Vandivier publisher. No patent liability is assumed with respect to the use of the infor- mation contained herein. Although every precaution has been taken in the Managing Editor preparation of this book, the publisher and author assume no responsibility Thomas Hayes for errors or omissions. Nor is any liability assumed for damages resulting from the use of the information contained herein. Project Editor International Standard Book Number: 0-7897-2443-x Tonya Simpson Library of Congress Catalog Card Number: 00-106209 Copy Editor Printed in the United States of America Michael Dietsch First Printing: September 2000 Indexer 02 01 00 4 3 2 Erika Millen Trademarks Proofreader Benjamin Berg All terms mentioned in this book that are known to be trademarks or ser- vice marks have been appropriately capitalized. Que Corporation cannot Team Coordinator attest to the accuracy of this information. Use of a term in this book should Vicki Harding not be regarded as affecting the validity of any trademark or service mark. Design Manager Warning and Disclaimer Sandra Schroeder Every effort has been made to make this book as complete and as accurate Cover Designer as possible, but no warranty or fitness is implied.
    [Show full text]
  • The Norman Book on Computer Viruses Ii Z the Norman Book on Computer Viruses
    The Norman Book on Computer Viruses ii z The Norman Book on Computer Viruses Norman ASA is not liable for any other form of loss or damage arising from use of the documentation or from errors or deficiencies therein, including but not limited to loss of earnings. In particular, and without the limitations imposed by the licensing agreement with regard to any special use or purpose, Norman ASA will in no event be liable for loss of profits or other commercial damage including but not limited to incidental or consequential damages. The information in this document as well as the functionality of the software is subject to change without notice. No part of this documentation may be reproduced or transmitted in any form or by any means, electronic or mechanical, including photocopying, recording or information storage and retrieval systems, for any purpose other than the purchaser's personal use, without the explicit written permission of Norman ASA. Contributors to The Norman Book on Viruses: Snorre Fagerland, Sylvia Moon, Kenneth Walls, Carl Bretteville Edited by Camilla Jaquet and Yngve Ness The Norman logo is a registered trademark of Norman ASA. Names of products mentioned in this documentation are either trademarks or registered trademarks of their respective owners. They are mentioned for identification purposes only. Norman documentation is Copyright © 1990-2002 Norman ASA. All rights reserved. October 2001 Copyright © 1990-2002 Norman z iii Norman Offices Norman Data Defense Systems Pty Ltd 6 Sarton Road, Clayton, Victoria, 3168 Australia. Tel: +61 3 9562 7655 Fax: +61 3 9562 9663 E-mail: [email protected] Web: http://www.norman.com.au Norman Data Defense Systems A/S Dronningensgade 23, DK-5000 Odense C, Denmark Tel.
    [Show full text]
  • The Manipur Municipalities Act, 1994 ___Arrangement of Sections
    THE MANIPUR MUNICIPALITIES ACT, 1994 ____________ ARRANGEMENT OF SECTIONS _____________ CHAPTER I PRELIMINARY SECTIONS 1. Short title, extent and commencement. 2. Definitions. CHAPTER II CONSTITUTION OF MUNICIPALITIES 3. Constitution of municipalities. 4. Effect of exclusion of local area from municipality. 5. Election and maintenance of boundary marks. CHAPTER III NAGAR PANCHAYAT 6. Incorporation of Nagar Panchayat. 7. Composition of Nagar Panchayat. 8. Application of certain provisions relating to Council in case of Nagar Panchayat. 9. Chairperson and Vice-Chairperson of Nagar Panchayat. 10. Election of Chairperson and Vice-Chairpersons. 11. Resignation by Chairperson, Vice Chairperson and Councillor. 12. Remuneration to Chairperson and Vice-Chairperson. CHAPTER IV MUNICIPAL COUNCIL 13. Incorporation of Municipal Council. 14. Municipal administration. 15. Composition of Council. 16. Constitution and composition of Wards Committees. 17. Reservation of seats. 18. Allocation of reserved seats and delimitation of wards. 19. Disqualifications for membership. 20. Oath of office. 21. Appointment of administrator. 22. Duration of municipalities, etc. 23. Every Council to have Chairperson and a Vice-Chairperson. 24. Election of Chairperson. 25. Election of Vice-Chairperson. 26. Chairperson and Vice-Chairperson cease to hold office as such. 27. Filling up of vacancies and term of office of persons filling up the vacancy. 1 SECTIONS 28. Resignation by Chairperson, Vice-Chairperson and Councillor. 29. Removal of Councillors. 30. Effect of removal of a Councillor. 31. No-confidence motion against Chairperson or Vice-Chairperson. 32. Grant of leave of absence to Chairperson or Vice-Chairperson. 33. Powers and functions of the Chairperson. 34. Function of Vice-Chairperson. 35. Remuneration of Chairperson and Vice-Chairperson.
    [Show full text]
  • "Year 2000 Y2K" December 28, 1999
    NIPC ADVISORY 99-031 "Year 2000 Y2K" December 28, 1999 Introduction Large-scale U.S. infrastructure disruptions are not expected from "Y2K failures" during the Y2K transition period. However we are prepared for a possible increase in real or reported criminal cyber activity (such as hacking and spreading computer viruses), considering the heightened awareness of and media focus on malicious activity during the Y2K period. Any increased criminal activity during the Y2K period could raise the level of problems in infrastructure systems, adding to genuine Y2K-generated issues and the normal level of infrastructure concerns. We anticipate encountering both known and new viruses and hacking exploits. We could see the dissemination of several new and possibly destructive viruses, and the successful exploitation of both corporate and government information systems. But even these possibilities reflect only a larger assembly of the same kinds of malicious activity seen and addressed every day. Finally, known and possible extremist or apocalyptic terrorist activity in the United States by individuals or groups suggests the possibility of threats to domestic infrastructures. For example, the media have reported arrests of certain individuals allegedly planning violent actions against electric power and oil and gas facilities. These indications of possible threats to our infrastructures warrant an increased vigilance to protect against both cyber and physical threats to our nation's critical infrastructures. Summary The Y2K Transition might be seen by potential malefactors as an unprecedented opportunity for malicious code release and associated publicity, where a new and significant exploit can achieve a widespread notoriety in the information security and hacker world.
    [Show full text]
  • Chapter 3: Viruses, Worms, and Blended Threats
    Chapter 3 Chapter 3: Viruses, Worms, and Blended Threats.........................................................................46 Evolution of Viruses and Countermeasures...................................................................................46 The Early Days of Viruses.................................................................................................47 Beyond Annoyance: The Proliferation of Destructive Viruses .........................................48 Wiping Out Hard Drives—CIH Virus ...................................................................48 Virus Programming for the Masses 1: Macro Viruses...........................................48 Virus Programming for the Masses 2: Virus Generators.......................................50 Evolving Threats, Evolving Countermeasures ..................................................................51 Detecting Viruses...................................................................................................51 Radical Evolution—Polymorphic and Metamorphic Viruses ...............................53 Detecting Complex Viruses ...................................................................................55 State of Virus Detection.........................................................................................55 Trends in Virus Evolution..................................................................................................56 Worms and Vulnerabilities ............................................................................................................57
    [Show full text]
  • Virus Bulletin, June 1999
    ISSN 0956-9979 JUNE 1999 THE INTERNATIONAL PUBLICATION ON COMPUTER VIRUS PREVENTION, RECOGNITION AND REMOVAL Editor: Francesca Thorneloe CONTENTS Technical Consultant: Fraser Howard Technical Editor: Jakub Kaminski COMMENT Flashback – When the Chips were Down 2 Consulting Editors: VIRUS PREVALENCE TABLE 3 Nick FitzGerald, Independent Consultant, NZ Ian Whalley, Sophos Plc, UK NEWS Richard Ford, Independent Consultant, USA 1. Two Be or not Two Be 3 Edward Wilding, Maxima Group Plc, UK 2. ThanY2Ks for the Memory! 3 LETTERS 4 IN THIS ISSUE: VIRUS ANALYSES 1. Beast Regards 6 • Oh dear, oh dear, oh dear Virus Bulletin: At long last 2. Papa Don’t Preach 8 the Letters page makes a comeback in this issue. Love it or hate it, it’s your way to have your say, starting on p.4. A DAY IN THE LIFE • Define your terms: Find out all you need to know about Educating Who? 10 polymorphism. Two researchers from Kaspersky Lab set FEATURES the record straight on p.14. 1. Virus Writers – Part 2 12 • Don’t panic! Our tutorial this month paves the way for 2. pOLEmorphism 14 future corporate case studies. In clear and easy-to-follow steps, the actions to take in the event of a virus or malware TUTORIAL outbreak on your system are documented on p.16. When Barriers Break Down 16 PRODUCT REVIEWS 1. DialogueScience AntiVirus Kit v3.0 18 2. eSafe Protect Enterprise 21 END NOTES AND NEWS 24 VIRUS BULLETIN ©1999 Virus Bulletin Ltd, The Pentagon, Abingdon, Oxfordshire, OX14 3YP, England. Tel +44 1235 555139. /99/$0.00+2.50 No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form without the prior written permission of the publishers.
    [Show full text]
  • National List of District & Railway CHILDLINE Units As on 30Th
    National list of District & Railway CHILDLINE Units as on 30th September 2019 S.N. State City Model Role Name of CHILDLINE partner 1 Andman & Hutbay Urban Support Prayas Juvenile Aid Centre Society 2 Nicobar Port Blair Urban Collab Prayas Juvenile Aid Centre Society 3 Andhra Pradesh Ananthapur Rural Collab Rayalaseema Development Trust-RDT 4 Rural Nodal Women's Development Trust 5 Rural Sub Centre Human and Natural Resources Development Society 6 Rural Sub Centre Praja Seva Samaj 7 Chittoor Rural Nodal Academy Gandhian Studies (AGS) Rural Sub Centre Rural Organization for Poverty Eradication Services 8 (ROPES) 9 Rural Collab Rashtriya Seva Samiti 10 Rural Collab Praja Pragathi Trust (PPT),Tirupathi Railway CHILDLINE 11 East Godavari Rural Collab People's Action For Rural Awakening (PARA) Eluru ( West Urban Collab Social Service Centre 12 Godavari) 13 Guntur Urban Collab Good Shepherd Convent Urban Nodal Social Educational and Economic Development 14 Society (SEEDS) 15 Ongole Urban Collab HELP 16 Srikakulam Rural Collab Youth Club of Bejjipuram (YCB) Rural Nodal Bapuji Rural Enlightenment and Development Society 17 (BREDS) Rural Sub Centre Bapuji Rural Enlightenment and Development Society 18 (BREDS) 19 Rural Sub Centre Gunna Udatayya Eternal Service Team (GUST) 20 Rural Sub Centre Gunna Udatayya Eternal Service Team (GUST) 21 Rural Sub Centre Action in Rural Technology and Services -ARTS 22 Rural Collab UPHOLD, Palsa Railway CHILDLINE 23 Vijayawada(Krishna) Urban Collab Forum for Child Rights 24 Urban Nodal Forum for Child Rights Urban
    [Show full text]
  • Basics of Ethical Hacking – Manthan M. Desai
    Hacking For Beginners – Manthan Desai 2010 Legal Disclaimer Any proceedings and or activities related to the material contained within this book are exclusively your liability. The misuse and mistreat of the information in this book can consequence in unlawful charges brought against the persons in question. The authors and review analyzers will not be held responsible in the event any unlawful charges brought against any individuals by misusing the information in this book to break the law. This book contains material and resources that can be potentially destructive or dangerous. If you do not fully comprehend something on this book, don‘t study this book. Please refer to the laws and acts of your state/region/ province/zone/territory or country before accessing, using, or in any other way utilizing these resources. These materials and resources are for educational and research purposes only. Do not attempt to violate the law with anything enclosed here within. If this is your intention, then leave now. While using this book and reading various hacking tutorials, you agree to follow the below mentioned terms and conditions: 1. All the information provided in this book is for educational purposes only. The book author is no way responsible for any misuse of the information. 2. "Hacking for Beginners” is just a term that represents the name of the book and is not a book that provides any illegal information. “Hacking for Beginners” is a book related to Computer Security and not a book that promotes hacking/cracking/software piracy. 3. This book is totally meant for providing information on "Computer Security”, "Computer Programming” and other related topics and is no way related towards the terms "CRACKING” or "HACKING” (Unethical).
    [Show full text]
  • DDMP of Health Department
    DDMP of Health Department Health Department Uttrakhand 1 DDMP of Health Department 1. INTRODUCTION 6 1.1 Brief Introduction and function of the Department 6 1.2 Departmental Structure 8 2. HAZARD, RISK, VULNERABILITY AND CAPACITY ASSESSMENT 9 2.1 The Nature and intensity of Disaster- State Level 9 2.2 Historical Analysis of the Risks of Departmental Resources 11 2.3 Climate and Climate induced Challenges 12 2.4 Institutional Arrangement 17 2.5 Departmental Challenges and Areas of Improvement 22 3. MEASURES TAKEN BY THE DEPARTMENT AT DIFFERENT PHASES OF DISASTER 23 3.1 Pre-disaster Action (Prevention, Mitigation and Preparedness) 23 3.2 Action during the Disaster 28 3.3 Post-disaster Action 31 4. MONITORING, REVIEW AND KNOWLEDGE MANAGEMENT OF DEPARTMENTAL DISASTER MANAGEMENT PLAN 32 4.1 Monitoring and Review 32 4.2 Role and Responsibility of State Units of the Department and the State 33 Emergency Operation Centre in Monitoring and Evaluation 4.3 Documentation of Learning 33 4.4 Monitoring indicators 34 5. BUDGET AND FINANCIAL ASSESSMENT 37 5.1 State Disaster Response Fund (SDRF) 37 5.2 National Disaster Response Fund (NDRF) 37 5.3 Chief Minister Relief Fund 38 5.4 Issuing Funds to Departments and Districts 38 References 39 Annexure 40 Annexure 1 : Physical and Human resources of department 41 2 DDMP of Health Department Table 1: Level of Disaster Management Authorities and its functions 18 Table 2: Institutions authorized by the Government of India to issue early warning for different disasters Table 3: Categorization of danger in terms of flood disaster Table 4: Categorization of danger in terms of landslide disaster Table 5: Categorization of danger in terms of avalanche disaster Table 6: Categorization of danger in terms of earthquake disaster Table 7: Monitoring indicators Index for Different Stages 3 DDMP of Health Department 4 DDMP of Health Department The geophysical conditions, variation in climatic components and recent occurrence of disasters have made clear that that the state Uttrakhand is a multi- hazard prone state of the country.
    [Show full text]
  • What Are Kernel-Mode Rootkits?
    www.it-ebooks.info Hacking Exposed™ Malware & Rootkits Reviews “Accessible but not dumbed-down, this latest addition to the Hacking Exposed series is a stellar example of why this series remains one of the best-selling security franchises out there. System administrators and Average Joe computer users alike need to come to grips with the sophistication and stealth of modern malware, and this book calmly and clearly explains the threat.” —Brian Krebs, Reporter for The Washington Post and author of the Security Fix Blog “A harrowing guide to where the bad guys hide, and how you can find them.” —Dan Kaminsky, Director of Penetration Testing, IOActive, Inc. “The authors tackle malware, a deep and diverse issue in computer security, with common terms and relevant examples. Malware is a cold deadly tool in hacking; the authors address it openly, showing its capabilities with direct technical insight. The result is a good read that moves quickly, filling in the gaps even for the knowledgeable reader.” —Christopher Jordan, VP, Threat Intelligence, McAfee; Principal Investigator to DHS Botnet Research “Remember the end-of-semester review sessions where the instructor would go over everything from the whole term in just enough detail so you would understand all the key points, but also leave you with enough references to dig deeper where you wanted? Hacking Exposed Malware & Rootkits resembles this! A top-notch reference for novices and security professionals alike, this book provides just enough detail to explain the topics being presented, but not too much to dissuade those new to security.” —LTC Ron Dodge, U.S.
    [Show full text]